Product Hardening
Reduce the surface vulnerability of your system by secure configuration.
Reduce the surface vulnerability of your system by secure configuration.
Liberin’s system hardening service focuses on a review of your inventory of the network-connected systems to understand what you have and how it is at risk before you can completely implement any hardening procedures. This includes reviewing current deployment and operational processes and understanding the threats and vulnerabilities to the various deployed systems and addressing any discovered security gaps. Our expert team focuses on configuration settings to remove unnecessary services, applying firewall rules, enforcing password complexity, setting failed login thresholds, and system idle time-outs. Our System hardening service can also include installing an antivirus program, up-to-date software, a centralized log management solution, and applying vendor-released system patches. Our expert team uses the hardening checklists which are based on the comprehensive checklists produced by The Center for Internet Security (CIS). Our system hardening service will ensure that the system will be protected against security misconfigurations which can lead to any breach.
The Liberin
Advantage
Daily checks
Checked on a daily basis with our 24 x7 x 365 monitoring and managed services where we closely monitor all critical network and server components in your environment, we also proactively notify you of critical hardware and operating system security alerts.
Patch and Remediation
Our teams work with your existing patch management solution to ensure all critical systems have all critical security patches applied within a timeline that is aligned to the exposure of the systems. We also ensure that the patching mechanisms cover not only the standard operating system patches but also those that might be applicable to databases and critical endpoint software.
Technology experience
Our teams have worked with numerous technology platforms across operating systems such as Windows, Sun Solaris, HP-UX, IBM AIX, Databases such as MS SQL Server, Oracle, Sybase, Web Servers, Mail Servers, Network Devices, as well as security devices such as Firewalls, IPS, WAF, etc.